Publications

Publication Thumbnail

Relia: Accelerating the Analysis of Cloud Access Control Policies

D. Wang, P. Zhang, Z. Gu, W. Lin, S. Jiang, Z. He, X. Du, L. Chen, J. Li, and X. Guan

Proceedings of the 40th IEEE/ACM International Conference on Automated Software Engineering (ASE 2025)

Research Area: Formal Methods, Software Engineering

Abstract

With the diversification of cloud services, cloud providers offer flexible access control by letting users apply fine-grained cloud access control policies to secure their cloud resources. However, flexibility comes with the cost that configuring cloud access control policies is error-prone. Therefore, cloud providers have developed SMT-based tools to formally analyze the user-defined policies. Unfortunately, we find these analyzers slow, due to the complex regular expression matching conditions in policies. To this end, this paper introduces Relia, a general method to speed up the analysis of cloud access control policies. The key idea of Relia is to pre-compute a set of String Equivalence Classes (SECs) based on the regular expressions in a policy, assign a unique integer to each SEC, and rewrite the regular constraints into equivalent integer constraints, which are easier to solve. We implement Relia as a transparent layer between our in-house access analyzer and off-the-shelf SMT solvers. Based on real policies from a large public cloud provider, we show that: when enabling Relia, our in-house portfolio solver (consisting of Z3, CVC4, and CVC5) can speed up the analysis process for nearly 95% of all cases, with an average speedup of 8.21×.

BibTeX

Read more »
Publication Thumbnail

AccessRefinery: Fast Mining Concise Access Control Intents on Public Cloud

N. Kang, P. Zhang, J. Zhang, H. Li, D. Wang, Z. Gu, W. Lin, S. Jiang, Z. He, X. Du, L. Chen, J. Li, and X. Guan

Proceedings of the 34th ACM International Conference on the Foundations of Software Engineering (FSE 2026)

Research Area: Formal Methods, Software Engineering

Abstract

Modern cloud applications heavily rely on Identity and Access Management (IAM) services to enforce flexible access control over their data. However, the flexibility comes at a cost: IAM policies are often complex and prone to misconfigurations, leading to risks of data exposure. There is an increasing need to mine a compact set of intents that describe what the policies collectively try to achieve, thereby enabling operators to better understand their policies. However, existing tools on mining access control intent have two major limitations: (1) the mining process is slow and even times out on some complex policies; (2) the mined intents are excessive in number and thus still hard to understand. To overcome these limitations, this paper presents AccessRefinery, which can speed up the mining process while reducing the number of intents. The key idea for the speedup is to reduce the redundancy of the multi-round SMT solving, by preprocessing the constraints into bit-vector constraints. For intent reduction, AccessRefinery computes a compact set of intents that can cover the mined intents, by solving a min-set-cover problem. Experiments based on real and synthetic datasets show that AccessRefinery achieves a ~10–100× speedup in intent mining, and reduces the number of intents by up to ~10×.

Read more »